Home | Amazing | Today | Tags | Publishers | Years | Search 
Microsoft Windows Networking Essentials
Microsoft Windows Networking Essentials

Computers are very common today, and just about any computer is connected to a network. People with the knowledge and expertise to configure and maintain networks are needed in any organization.

IT administration starts with network administration in most organizations. If the computers can’t communicate on the network,...

Manager's Guide to the Sarbanes-Oxley Act: Improving Internal Controls to Prevent Fraud
Manager's Guide to the Sarbanes-Oxley Act: Improving Internal Controls to Prevent Fraud

A recent CBS poll revealed that, as a result of corporate scandals at Enron, WorldCom, Adelphia Communications, and others, a whopping two-thirds of Americans believe that corporate executives are dishonest. This overall assessment is even worse now than during the last financial crises, the savings and loan debacle of the 1980s....

Advanced Crime Scene Photography
Advanced Crime Scene Photography

Advanced Crime Scene Photography developed over time and out of my experiences as a crime scene investigator with a large metropolitan police department. Like any major city, violent crime is prevalent, offering numerous opportunities to utilize the different skills and techniques learned and evolved through numerous schools, scene...

Application Theory of Petri Nets: 32nd International Conference, PETRI NETS 2011, Newcastle, UK, June 20-24, 2011
Application Theory of Petri Nets: 32nd International Conference, PETRI NETS 2011, Newcastle, UK, June 20-24, 2011

This volume constitutes the proceedings of the 32nd International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2011). The Petri Net conferences serve as annual meeting places to discuss the progress in the field of Petri nets and related models of concurrency. They provide a forum for...

Social Media Playbook for Business: Reaching Your Online Community with Twitter, Facebook, LinkedIn, and More
Social Media Playbook for Business: Reaching Your Online Community with Twitter, Facebook, LinkedIn, and More

Social media can be an incredibly powerful marketing tool that brings a company or organization huge rewards. But for beginners in this new world, the potential risks are also high. Consumers are particularly passionate in the online world; the most active social networkers are poised to be your brand's gushing fans—or your most...

The Oracle Universal Content Management Handbook
The Oracle Universal Content Management Handbook

Enterprise Content Management (ECM) is getting a lot of attention in corporations around the world today. Corporations create a large amount of unstructured content in the form of documents, scanned content, videos, audio, photos, images, and so on. Some statistics show that more than 80 percent of a corporation's intellectual property...

Introduction to Information Systems: Supporting and Transforming Business
Introduction to Information Systems: Supporting and Transforming Business

Rainer, Cegielski Introduction to Information Systems will answer this question for you. In every chapter, you will see how real global businesses use technology and information systems to increase their profitability, gain market share, improve their customer service, and manage their daily operations. In other words, information...

Theoretical Computer Sciences: Lectures given at a Summer School of the Centro Internazionale Matematico Estivo
Theoretical Computer Sciences: Lectures given at a Summer School of the Centro Internazionale Matematico Estivo

R.E. Miller: Parallel program schemata.- D.E. Muller: Theory of automata.- R. Karp: Computational complexity of combinatorial and graph-theoretic problems.

In this lecture we discuss a type of computer organization which is based upon the concept of operation sequencing being controlled by operand availability. Such sequencing...

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

Closed Object Boundaries from Scattered Points (Lecture Notes in Computer Science)
Closed Object Boundaries from Scattered Points (Lecture Notes in Computer Science)

This Ph.D. dissertation presents the result of research carried out between 1985 and 1992, first at Leiden University as a scientific assistant researcher, and later at CWI (Centre for Mathematics and Computer Science), Amsterdam, as a researcher on the NFI IIICAD project, funded by NWO (Dutch Organization for Scientific Research)...

Bioinformatics Basics: Applications in Biological Science and Medicine
Bioinformatics Basics: Applications in Biological Science and Medicine

Scientists in the throes of research use an extensive data bank to access structural information on proteins and nucleic acids. Meanwhile, geneticists use a highly specialized form of software to analyze the hybridization pattern of DNA chips. The past decade has been tremendously successful for biotechnology and pharmaceutical...

Hacking the Human
Hacking the Human

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...

Result Page: 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy